Overview
overview
10Static
static
document-85285.iso
windows7-x64
3document-85285.iso
windows10-2004-x64
3documents-7847.lnk
windows7-x64
8documents-7847.lnk
windows10-2004-x64
8habitablen...ts.png
windows7-x64
3habitablen...ts.png
windows10-2004-x64
3templates642.dll
windows7-x64
10templates642.dll
windows10-2004-x64
10yurts.cmd
windows7-x64
8yurts.cmd
windows10-2004-x64
8Analysis
-
max time kernel
38s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-10-2022 20:11
Static task
static1
Behavioral task
behavioral1
Sample
document-85285.iso
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
document-85285.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
documents-7847.lnk
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
documents-7847.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
habitableness_crickets.png
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
habitableness_crickets.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
templates642.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
templates642.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
yurts.cmd
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
yurts.cmd
Resource
win10v2004-20220901-en
General
-
Target
yurts.cmd
-
Size
728B
-
MD5
9d57f4c611f4df4d4a8757f097e70356
-
SHA1
00c069c6ce4d53d06a8c4716342d30a4add4087c
-
SHA256
d6b3d6cf6450d560fbb778670879f24e2094191226124510959f2977a5538a90
-
SHA512
faecb7866326de8615e4ee3b61f2a514bd04846dc597a90f15c8ab7ff1a8db77b815656eb0fd4156c0a9f916dae14cd2fb50922c52d63fa82c2c11971e97d2a2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1992 forthcame.exe -
Loads dropped DLL 1 IoCs
pid Process 364 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 364 wrote to memory of 1048 364 cmd.exe 28 PID 364 wrote to memory of 1048 364 cmd.exe 28 PID 364 wrote to memory of 1048 364 cmd.exe 28 PID 364 wrote to memory of 1212 364 cmd.exe 29 PID 364 wrote to memory of 1212 364 cmd.exe 29 PID 364 wrote to memory of 1212 364 cmd.exe 29 PID 364 wrote to memory of 928 364 cmd.exe 30 PID 364 wrote to memory of 928 364 cmd.exe 30 PID 364 wrote to memory of 928 364 cmd.exe 30 PID 364 wrote to memory of 1520 364 cmd.exe 31 PID 364 wrote to memory of 1520 364 cmd.exe 31 PID 364 wrote to memory of 1520 364 cmd.exe 31 PID 364 wrote to memory of 1992 364 cmd.exe 32 PID 364 wrote to memory of 1992 364 cmd.exe 32 PID 364 wrote to memory of 1992 364 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\yurts.cmd"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"2⤵PID:1048
-
-
C:\Windows\system32\xcopy.exexcopy C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\forthcame.exe /h /s /e2⤵PID:1212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo f"2⤵PID:928
-
-
C:\Windows\system32\xcopy.exexcopy templates642.png C:\Users\Admin\AppData\Local\Temp\4371.25811 /h /s /e2⤵PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\forthcame.exeC:\Users\Admin\AppData\Local\Temp\forthcame.exe C:\Users\Admin\AppData\Local\Temp\4371.25811,#12⤵
- Executes dropped EXE
PID:1992
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5dd81d91ff3b0763c392422865c9ac12e
SHA1963b55acc8c566876364716d5aafa353995812a8
SHA256f5691b8f200e3196e6808e932630e862f8f26f31cd949981373f23c9d87db8b9
SHA5128a5036ccab9c9e71deb4ecb9598528ca19c2d697a836846d23e1547b24172fa236a798092c7db676929abff830e40f52ce8f3b3bdd8d4c2553d7c021fceaf120
-
Filesize
44KB
MD5dd81d91ff3b0763c392422865c9ac12e
SHA1963b55acc8c566876364716d5aafa353995812a8
SHA256f5691b8f200e3196e6808e932630e862f8f26f31cd949981373f23c9d87db8b9
SHA5128a5036ccab9c9e71deb4ecb9598528ca19c2d697a836846d23e1547b24172fa236a798092c7db676929abff830e40f52ce8f3b3bdd8d4c2553d7c021fceaf120